Check patentability & draft patents in minutes with Patsnap Eureka AI!

Schnorr ring signature scheme with specified verifiability

A technology of specified verification and ring signature, applied in user identity/authority verification, digital transmission system, electrical components, etc., can solve the problems of high signature complexity, high implementation cost, complicated interaction process, etc.

Inactive Publication Date: 2015-12-23
HOHAI UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of this problem, earlier research works include: a verifiable ring signature scheme based on double discrete logarithms proposed by Lv et al. in 2003, but the signature complexity is too high
In 2004, GAN et al. embedded authentication information in the off-valve channel, and also realized the verifiability of the ring signature, but the implementation cost is high
[0004] In recent years, deniable ring signatures (Komanoetal, 2006), Step-Out ring signatures (Klonowski etal, 2008), and extended RST ring signatures (Dongetal, 2012) have been proposed successively, but they all have complicated interaction processes and complex implementations. , the problem of inefficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Schnorr ring signature scheme with specified verifiability
  • Schnorr ring signature scheme with specified verifiability
  • Schnorr ring signature scheme with specified verifiability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further clarified below in conjunction with the drawings and specific embodiments.

[0044] Such as figure 1 As shown, it is a common Schnorr ring signature scheme (Herranzetal, 2003), which includes three steps of system initialization, signature generation, and signature verification. The Schnorr ring signature scheme with specified verifiability is based on it. Added the steps of identity confirmation, such as figure 2 As shown, the program includes a system initialization module, a signature module, a verification module, and a confirmation module; the program selects the system parameters for generating the signature and the verification signature, and generates the public and private keys of the ring members; the members use the private key to sign the message; The public parameters of the system and the public keys of all ring members are used to verify the message signature; the signer uses the public key of the designated verifier t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Schnorr ring signature scheme with specified verifiability. The scheme comprises four stages, namely, system initialization, signature generation, signature verification and identity confirmation. An identity confirmation process of the scheme is interactive zero-knowledge proof, the identity confirmation can be finished by only twice interaction of a signer and a verification party, and identity evidences presented in the process are incommunicable. Meanwhile, the scheme is based on Schnorr ring signature, and each stage has high execution efficiency. Under a random oracle model, adaptive chosen-message attacks can be resisted, namely, unforgeability is realized.

Description

Technical field [0001] The invention relates to a digital signature technology, in particular to a Schnorr ring signature scheme with specified verifiability. Background technique [0002] More and more network applications involve the interaction of private information, and the demand for anonymous communication capabilities is increasing. Ring signature is a new type of anonymous signature technology that was proposed by Rivest et al. in 2001 under the background of "securely leaking secrets". It is a special group-oriented signature. There is no group administrator and group establishment process. The signer only needs to select a part of the member public key (used to hide the signer's identity), and then generate a signature with his own private key. This reduces a lot of complicated interactive certification process. The biggest feature of ring signature is that the signer has unconditional anonymity. Even if the attacker has unlimited computing power, he cannot track the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3247
Inventor 吕鑫刘璇马鸿旭平萍李水艳王爱莉余群
Owner HOHAI UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More